CVE-2025-14277

4.3 MEDIUM

📋 TL;DR

The Prime Slider plugin for WordPress has a Server-Side Request Forgery (SSRF) vulnerability that allows authenticated users with subscriber-level access or higher to make arbitrary web requests from the vulnerable server. This could enable attackers to query internal services, potentially exposing sensitive information or interacting with internal systems. All WordPress sites using Prime Slider versions up to 4.0.9 are affected.

💻 Affected Systems

Products:
  • Prime Slider – Addons for Elementor (WordPress plugin)
Versions: All versions up to and including 4.0.9
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with at least subscriber-level access. Both free (lite) and premium versions are affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access internal services, retrieve sensitive data from internal APIs, interact with cloud metadata services, or pivot to attack other internal systems.

🟠

Likely Case

Information disclosure from internal services, reconnaissance of internal network, or limited data exfiltration from accessible internal endpoints.

🟢

If Mitigated

Limited impact if internal services are properly segmented and authenticated, with network controls preventing arbitrary outbound requests.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authenticated. The vulnerability is in the import_elementor_template AJAX action.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.1.0 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3419222/bdthemes-prime-slider-lite

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Prime Slider – Addons for Elementor'. 4. Click 'Update Now' if available, or download version 4.1.0+ from WordPress repository. 5. Activate the updated plugin.

🔧 Temporary Workarounds

Disable vulnerable AJAX endpoint

all

Remove or restrict access to the vulnerable import_elementor_template AJAX action

Add to theme's functions.php or custom plugin: remove_action('wp_ajax_import_elementor_template', 'your_callback_function');

Restrict user registration

all

Temporarily disable new user registration to prevent attacker account creation

In WordPress Settings → General, uncheck 'Anyone can register'

🧯 If You Can't Patch

  • Implement network segmentation to restrict outbound requests from web servers
  • Add WAF rules to block requests to internal IP ranges and localhost

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for Prime Slider version. If version is 4.0.9 or lower, you are vulnerable.

Check Version:

wp plugin list --name='Prime Slider' --field=version

Verify Fix Applied:

Verify Prime Slider version is 4.1.0 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /wp-admin/admin-ajax.php with action=import_elementor_template
  • Outbound requests from web server to internal IP ranges or localhost

Network Indicators:

  • Web server making unexpected outbound HTTP requests, especially to internal IPs or metadata services

SIEM Query:

source="web_server_logs" AND uri="/wp-admin/admin-ajax.php" AND post_data CONTAINS "import_elementor_template"

🔗 References

📤 Share & Export